Common Information
Type | Value |
---|---|
Value |
User Execution |
Category | Attack-Pattern |
Type | Mitre-Ics-Techniques |
Misp Type | Cluster |
Description | Adversaries may rely on a targeted organizations’ user interaction for the execution of malicious code. User interaction may consist of installing applications, opening email attachments, or granting higher permissions to documents. Adversaries may embed malicious code or visual basic code into files such as Microsoft Word and Excel documents or software installers. Execution of this code requires that the user enable scripting or write access within the document. Embedded code may not always be noticeable to the user especially in cases of trojanized software |
Details | Published | Attributes | CTI | Title | ||
---|---|---|---|---|---|---|
Details | Website | 2023-05-16 | 13 | Analyst Exercise: Phishing Analysis with Thunderbird and Talos ⚠️📧 | ||
Details | Website | 2023-05-16 | 6 | Trustwave Threat Hunt Team Uncovers Healthcare Industry Vulnerabilities | ||
Details | Website | 2023-05-15 | 5 | NVD - CVE-2023-20914 | ||
Details | Website | 2023-05-12 | 138 | Securonix Threat Labs Security Advisory: Latest Update: Ongoing MEME#4CHAN Attack/Phishing Campaign uses Meme-Filled Code to Drop XWorm Payloads | ||
Details | Website | 2023-05-12 | 16 | BlackSuit Ransomware Strikes Windows and Linux Users | ||
Details | Website | 2023-05-11 | 19 | Dissecting Rancoz Ransomware | ||
Details | Website | 2023-05-10 | 7 | Making Waves: TTP Intelligence Highlights in April | ||
Details | Website | 2023-05-10 | 20 | Unraveling Akira Ransomware | ||
Details | Website | 2023-05-09 | 12 | 3CX Supply Chain Campaign Technical analysis and POC | ||
Details | Website | 2023-05-05 | 42 | Sophisticated DarkWatchMan RAT Spreads Through Phishing Sites | ||
Details | Website | 2023-05-03 | 100 | New KEKW Malware Variant Identified in PyPI Package Distribution | ||
Details | Website | 2023-05-03 | 40 | BlackBit Ransomware: A Threat from the Shadows of LokiLocker | ||
Details | Website | 2023-05-02 | 54 | Polish Healthcare Industry Targeted by Vidar Infostealer Likely Linked to Djvu Ransomware | ||
Details | Website | 2023-04-28 | 32 | Citrix Users at Risk: AresLoader Spreading Through Disguised GitLab Repo | ||
Details | Website | 2023-04-26 | 15 | Threat Actor Selling New Atomic macOS (AMOS) Stealer on Telegram | ||
Details | Website | 2023-04-25 | 54 | Anomali Cyber Watch: Two Supply-Chain Attacks Chained Together, Decoy Dog Stealthy DNS Communication, EvilExtractor Exfiltrates to FTP Server | ||
Details | Website | 2023-04-24 | 892 | Vulnerability Summary for the Week of April 17, 2023 | CISA | ||
Details | Website | 2023-04-21 | 6 | Domino Malware Detection: Ex-Conti and FIN7 Threat Actors Collaborate to Spread a New Backdoor - SOC Prime | ||
Details | Website | 2023-04-21 | 23 | Qakbot Malware Continues to Morph | ||
Details | Website | 2023-04-20 | 56 | Linux malware strengthens links between Lazarus and the 3CX supply‑chain attack | WeLiveSecurity | ||
Details | Website | 2023-04-20 | 65 | Linux malware strengthens links between Lazarus and the 3CX supply‑chain attack | WeLiveSecurity | ||
Details | Website | 2023-04-20 | 481 | ATT&CK Changes | ||
Details | Website | 2023-04-19 | 178 | New TACTICAL#OCTOPUS Attack Campaign Targets US Entities with Malware Bundled in Tax-Themed Documents | ||
Details | Website | 2023-04-19 | 5 | NVD - CVE-2023-21083 | ||
Details | Website | 2023-04-18 | 28 | CrossLock Ransomware Emerges: New GoLang-Based Malware On the Horizon |